Back to Developers
Chakri junjunuri

Chakri junjunuri

Security Analyst

Hyderabad
78
Profile Score

About

Cyber security Analyst with over 3+ years of experience in 24/7 Security Operations Center (SOC) environments. Proficient in using SIEM tools such as Azure Sentinel, IBM QRadar, and Splunk to monitor, detect, and respond to security events. Expertise in incident handling, threat detection, network traffic monitoring, and log analysis. Strong background in identifying and classifying attempted network compromises through heuristics analysis and suspect traffic identification. Skilled in providing real-time security event response, ensuring system integrity, and mitigating security risks.

Skills & Expertise (13)

Azure Sentinel Advanced
8.1/10
3
Years Exp
Incident Response Advanced
8.0/10
3
Years Exp
Threat Detection Advanced
8.0/10
3
Years Exp
Security Event Response Advanced
8.0/10
3
Years Exp
Microsoft Defender for Endpoints Advanced
7.7/10
3
Years Exp
Microsoft Defender for O365 Advanced
7.7/10
3
Years Exp
Network traffic monitoring Advanced
7.5/10
3
Years Exp
Log Analysis Advanced
7.5/10
3
Years Exp
KQL Advanced
7.0/10
3
Years Exp
IBM QRadar Intermediate
6.5/10
3
Years Exp
Splunk Intermediate
6.5/10
3
Years Exp
FortiGate Intermediate
6.5/10
3
Years Exp
Service Now Intermediate
6.5/10
3
Years Exp

Work Experience

Security Analyst

Infosys Private Limited

Jun 2022 - Feb 2026

Monitoring and analysis of events generated by various security and network tools like Firewalls, Proxy servers, AV, IPS/IDS, System Application, Windows and Linux servers etc. Responsible for monitoring security alerts, analysis of logs, investigation, and assessment on whether the incident is False positive or True positive. Using SIEM tool Azure sentinel to detect possible signs of security breaches and perform detailed investigation to confirm successful breach. Perform root cause analysis (RCA) and appropriately handle the incident as per defined Incident Management Framework. Following end to end Incident Investigation and Incident Response process, ensuring close the investigation within defined SLA. Leveraging KQL (Kusto Query Language) to identify anomalous behavior, and work with threat intelligence to investigate and respond to emerging threats. Creating tickets in Service now and tracking the status of the incidents. Analyse Microsoft Defender for Office 365 for suspicious activity, phishing attempts, and unauthorized access. Investigating phishing alerts generated by Microsoft defender for office 365 such as potential URL clicks, suspicious email attachments opened and removed after delivery. Knowledge sharing sessions with the team members whenever complex incident issues are raised and also lessons learned from other team members. Analyse device timeline in Microsoft Defender for Endpoint to identify suspicious processes, logins, and network activity. Perform remediation by quarantining or deleting malicious files and blocking indicators.

Education

B.Tech - ACE Engineering College

2019 - 2021 · Afghanistan

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 18/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 78/100

Profile Overview

Member sinceMar 2026

Skills (13)

Azure Sentinel Incident Response Threat Detection Security Event Response Microsoft Defender for Endpoints Microsoft Defender for O365 Network traffic monitoring Log Analysis KQL IBM QRadar +3 more